Monitoring of MonitoringOr the story of the guy who wanted to monitor the monitoring stack…Jul 25Jul 25
Exposing Illusion: Unveiling The False Sense of Security Provided by Security ToolsOr why chasing after the next shiny object won’t make your product more securedOct 29, 2023Oct 29, 2023
Create a Slack bot in Go to automate self-serviceor how simple and fast you can deploy your first Slack botSep 29, 2022Sep 29, 2022
Build a scalable Prometheus based architecturePrometheus is an excellent choice for monitoring a Kubernetes cluster, but it doesn’t scale out over several clusters.Jul 6, 2022Jul 6, 2022
How service ownership makes your product more reliableMaking your engineers responsible for their code in production may impact their development velocity, but will make your product more…Apr 6, 2022Apr 6, 2022
How to create “story teller” metrics for a better monitoringNot all metrics were born equal. Without “story teller” metrics you will not have a good monitoring of your product.Jan 16, 2022Jan 16, 2022
SRE? Understand vendor lock-in for your managed monitoring service.‘Vendor lock-in’ has been around since the beginning of the hardware and software industries when companies had to choose their mainframe…Nov 14, 2021Nov 14, 2021
4 questions you must ask when an incident happensWhen an incident is happening “it’s all about the scope” to assess its severity, to provide visibility to management and customers, and to…Sep 23, 2021Sep 23, 2021
Moving our monitoring system from managed Datadog to self-managed Prometheus stackGrowing a startupJun 13, 20212Jun 13, 20212